HIT Consultant Insightful coverage of healthcare innovation
 

fundamental

Results 326 - 350 of 441Sort Results By: Published Date | Title | Company Name
Published By: Symantec Corporation     Published Date: Jul 11, 2014
Always On SSL is a fundamental, cost-effective security measure that provides end-to-end protection for website visitors by enforcing the use of encryption with SSL certificates from a trusted Certificate Authority on every single page.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: Epicor     Published Date: Jun 30, 2014
Manufacturers that address the fundamental requirements know that “Top-to-Shop” isn’t an urban legend anymore. Those that have eliminated the disconnect between the shop floor and the top floor have succeeded in enhancing the extended supply chain. More importantly, their executive leadership consistently achieves business goals—with the help of those on the line and in plant, operations and management.
Tags : 
epicor, manufacturing, operations, cost cutting, machinery, labor, contract manufacturing
    
Epicor
Published By: BMC Software     Published Date: Jun 13, 2014
The last five years have fundamentally changed the way people interact with technology, leaving IT in a reactive mode. As business customers have rushed to “consumerized” services and experiences, IT is beginning to redefine its approach to offering IT services.  In this eBook, explore the top trends driving the New IT for IT Service Management, and how leading organizations are evolving to focus on end-user experience.
Tags : 
bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
BMC Software
Published By: Box     Published Date: Jun 11, 2014
The old world of collaboration—desktops, wired network connections, virtual private networks, and clunky software—has given way to a new world of collaboration. Today’s generation of mobile devices, wireless technologies, and cloud capabilities has had an inexorable and fundamental impact on how people work together and share information. Collaboration is now device- and network-agnostic. It’s not just about being able to work anywhere and anytime, it’s about being able to connect to any document at any time. Read this CIO white paper to learn how to bridge the gap in the modern world.
Tags : 
box, collaboration, desktops, wired networks, virtual private networks, mobile devices, wireless technologies
    
Box
Published By: IBM     Published Date: May 28, 2014
The right test data management solution accelerates time to value for business-critical applications and builds relationships and efficiencies across the organization. IBM InfoSphere Optim Test Data Management closes the gap between DBAs and application developers by providing all teams with accurate, appropriately masked and protected data for their work. Developers can confirm that new application functionalities perform as expected. QA staff can validate that the application performs as intended based on the test cases, and that integrations work properly. And business leaders can be more confident that competitive functionality will be delivered on time with less risk.
Tags : 
ibm, ibm infosphere, ibm optim solutions, ibm test data, test data management, dba, database management, big data
    
IBM
Published By: McAfee     Published Date: May 19, 2014
Las redes informáticas están diseñadas para facilitar el flujo de comunicación, no para impedirlo. Desafortunadamente, los paquetes de datos pueden ser manipulados de manera que parezcan normales, aunque contengan un exploit. Estas técnicas eluden las medidas de seguridad estándar y, en la mayoría de los casos, distribuyen una carga maliciosa sin ser detectada. A menudo, estas técnicas de evasión avanzadas (AETs) aprovechan propiedades de protocolos poco utilizadas, en combinaciones inesperadas y la mayoría de los dispositivos de seguridad de red no son capaces de detectarlas. Aunque muchos superan pruebas de la industria con altas calificaciones, estas se basan en la protección contra un número reducido de amenazas. Se desconoce el número exacto de AETs, pero se calcula que hay cientos de millones. Para protegerse, la seguridad de red debe incorporar algunas funciones fundamentales.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw
    
McAfee
Published By: SAP     Published Date: May 18, 2014
Leading companies and technology providers are rethinking the fundamental model of analytics, and the contours of a new paradigm are emerging. The new generation of analytics goes beyond Big Data (information that is too large and complex to manipulate without robust software), and the traditional narrow approach of analytics which was restricted to analysing customer and financial data collected from their interactions on social media. Today companies are embracing the social revolution, using real-time technologies to unlock deep insights about customers and others and enable better-informed decisions and richer collaboration in real-time.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
    
SAP
Published By: IBM     Published Date: May 02, 2014
This eBookoutlines the best practices for data lifecycle management and how InfoSphere Optimsolutions enable organizations to support and implement them.
Tags : 
ibm, integrating big data, governing big data, integration, best practices, big data, ibm infosphere, it agility
    
IBM
Published By: McAfee     Published Date: Apr 16, 2014
This paper examines what US federal agencies and organizations should look for in log management strategy and integration into and support of applicable and prospective security and compliance programs and initiatives.
Tags : 
siem, log management, federal agency, compliance, situational awareness, visualization
    
McAfee
Published By: IBM     Published Date: Apr 15, 2014
Confused by all the agile advice? Relax! With Agile for Dummies by your side you'll learn the fundamentals of agile and how to increase the productivity of your software teams while enabling them to produce higher-quality solutions that better fulfill customer needs much faster.
Tags : 
ibm, agile, software, software development, scale, agile teams, solutions, productivity
    
IBM
Published By: TeamQuest     Published Date: Apr 09, 2014
The goal of capacity planning is to provide satisfactory service levels to users in a cost-effective manner. This paper describes the fundamental steps for performing capacity planning. Real life examples are provided using TeamQuest® Performance Software.
Tags : 
teamquest, virtualization, it professionals, optimize software, distributed environment, data center, performance
    
TeamQuest
Published By: ServiceNow     Published Date: Mar 26, 2014
Learn how creating a great service catalog can help alleviate the pressure of demonstrating the value of IT to the business and why many consider it to be fundamental to any IT improvement initiative.
Tags : 
service catalog, visibility, it value, compliance, service management
    
ServiceNow
Published By: FireEye     Published Date: Mar 05, 2014
Today's cyber attacks have changed radically from just a few years ago. No longer are they the sole province of opportunistic crooks, online vandals and digitial ""hacktivists."" Today, advanced cyber attacks are the weapon of choice for organized criminal enterprises and nation-states. This white paper highlights: Why organizations need much more than fundamental security tools; Strategies for dealing with advanced targeted attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: FireEye     Published Date: Feb 28, 2014
Organizations need much more than fundamental security tools. Do you know why? Learn more in this whitepaper.
Tags : 
fireeye, gartner research, cyber attacks, security posture, system exploitation, advanced attacks, malware download, control established
    
FireEye
Published By: Badgeville     Published Date: Feb 13, 2014
Game applications in business result in both long and short-term success. Short-term effects will occur quickly, while proper implementation and use of game psychology will enable business leaders to maintain this success in the long-term. Gain valuable insights into both long and short-term gamification success from these industry visionaries, and learn how to harness the power of games to fundamentally change the nature of work.
Tags : 
gamfiication, gamify, engagement, bunchball, gigya, big door, loyalty, productivity
    
Badgeville
Published By: Varonis     Published Date: Feb 05, 2014
Varonis has conducted several surveys over the last year, and the results indicate that most organizations recognize they need to do a better job securing their own data, and a much better job securing your data. The most disturbing discovery, though, is that in large numbers they lack the fundamental controls necessary to ensure safe digital collaboration.
Tags : 
varonis, data, data migration, digital revolution, digital collaboration
    
Varonis
Published By: IBM     Published Date: Feb 04, 2014
How can we improve competitive advantage through procurement excellence?
Tags : 
ibm, cpo, procurement organizations, procurement challenges, procurement fundamentals, procurement performance, effective procurement, organizational value
    
IBM
Published By: Riverbed     Published Date: Jan 28, 2014
Forrester benchmark data on current state of application availability and performance within the enterprise. In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services. Read the report to learn the key findings of this study.
Tags : 
riverbed, forrester consulting, application performance management, application availability, enterprise, it transactions, business services, business-critical applications
    
Riverbed
Published By: Logicworks     Published Date: Jan 27, 2014
In this whitepaper, you will learn how to overcome 3 fundamental problems that organizations face in the context of managing their backup windows.
Tags : 
logicworks, backup, backup window, back-as-a-service, baas, restores, archiving, cloud
    
Logicworks
Published By: Achievers     Published Date: Jan 17, 2014
Today’s workforce is fundamentally changing. Organizations are flatter, more agile, and require even better retention strategies. HR professionals and business leaders agree on the importance of attracting, retaining, and cultivating top talent. An employee rewards and recognition program that has the buy-in and support of business leaders can transform your corporate culture, making your organization a great place to work, building your brand as a top employer, delighting your customers with your service, and reaping the financial benefits that come from Employee Success. Download this white paper, Obtaining executive buy-in for recognition programs, and obtain best practices to sell the vision of a rewards and recognition program to your CFO.
Tags : 
employee success, employee recognition, employee engagement
    
Achievers
Published By: SafeNet     Published Date: Jan 14, 2014
Today’s data resides in a virtualized world, but the risks are all too real, and, in many organizations, too frequently realized. This paper examines the fundamental security implications of cloud services and virtualization, and it details an approach organizations can take to safeguard sensitive assets in a way that is aligned with today’s dynamic environments.
Tags : 
virtualization, cloud services, security, encryption, safenet
    
SafeNet
Published By: Metalogix     Published Date: Jan 10, 2014
Microsoft SharePoint is the fastest growing product in Microsoft history. Its adoption rate has been exponential with millions of documents being stored daily. With its growth, critical documents and procedures are now being stored in SharePoint. It is fundamental that SharePoint maintains its healthy status, and application performance is a key component for a successful deployment, adoption and monitoring of SharePoint.
Tags : 
sharepoint, sharepoint performance, sharepoint adoption, optimize sharepoint, sharepoint diagnostics, sharepoint tuning, sharepoint performancetuning, sharepoint performance monitoring
    
Metalogix
Published By: Palo Alto Networks     Published Date: Dec 11, 2013
Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: - The fundamentals of modern firewall technology - The ten critical business requirements your next firewall needs to address - Information on how to create a vendor request for proposal (RFP) - A functional test plan to assist in your firewall selection process
Tags : 
firewall, palo alto, security, network security, safe applications, cyber threats
    
Palo Alto Networks
Published By: RingCentral     Published Date: Dec 05, 2013
Businesses of all sizes have a fundamental reliance on their communications infrastructure. This guide is designed to help you with the considerations you should be taking when looking to implement a new communications solution.
Tags : 
phone system, ringcentral, ring central, communications, business communications, wireless, business phones, wireless phones
    
RingCentral
Published By: ServiceNow     Published Date: Nov 22, 2013
This white paper explores how SaaS has fundamentally changed the economics for ITSM by reducing or removing maintenance, internal resource, and infrastructure costs.
Tags : 
servicenow, enterprise it, saas economics, itsm project, internal resource, infrastructure costs, service automation, software maintenance
    
ServiceNow
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.